Sciweavers

CCS
2015
ACM
8 years 3 days ago
Deniable Key Exchanges for Secure Messaging
In the wake of recent revelations of mass government surveillance, secure messaging protocols have come under renewed scrutiny. A widespread weakness of existing solutions is the ...
Nik Unger, Ian Goldberg
CCS
2015
ACM
8 years 3 days ago
I Know Where You are: Proofs of Presence Resilient to Malicious Provers
In the recent years, new services and businesses leveraging location-based services (LBS) are rapidly emerging. On the other hand this has raised the incentive of users to cheat a...
Markus Miettinen, N. Asokan, Farinaz Koushanfar, T...
CCS
2015
ACM
8 years 3 days ago
Fraud Detection through Graph-Based User Behavior Modeling
How do anomalies, fraud, and spam effect our models of normal user behavior? How can we modify our models to catch fraudsters? In this tutorial we will answer these questions con...
Alex Beutel, Leman Akoglu, Christos Faloutsos
CCS
2015
ACM
8 years 3 days ago
Android Rooting: Methods, Detection, and Evasion
Android rooting enables device owners to freely customize their own devices and run useful apps that require root privileges. While useful, rooting weakens the security of Android...
San-Tsai Sun, Andrea Cuadros, Konstantin Beznosov
CCS
2015
ACM
8 years 3 days ago
FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications
Bugs in the authorisation logic of web applications can expose the data of one user to another. Such data disclosure vulnerabilities are common—they can be caused by a single om...
Divya Muthukumaran, Dan O'Keeffe, Christian Priebe...
CCS
2015
ACM
8 years 3 days ago
Automated Proofs of Pairing-Based Cryptography
Gilles Barthe, Benjamin Grégoire, Benedikt ...
CCS
2015
ACM
8 years 3 days ago
CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
The cached Internet content served by content delivery networks (CDN) comprises a large fraction of today’s Internet traffic, yet, there is little study on how real-world censor...
John Holowczak, Amir Houmansadr
CCS
2015
ACM
8 years 3 days ago
XiOS: Extended Application Sandboxing on iOS
Until very recently it was widely believed that iOS malware is effectively blocked by Apple’s vetting process and application sandboxing. However, the newly presented severe ma...
Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahm...
CCS
2015
ACM
8 years 3 days ago
Surpass: System-initiated User-replaceable Passwords
System-generated random passwords have maximum password security and are highly resistant to guessing attacks. However, few systems use such passwords because they are difficult t...
Jun Ho Huh, Seongyeol Oh, Hyoungshick Kim, Konstan...
CCS
2015
ACM
8 years 3 days ago
Automated Analysis and Synthesis of Authenticated Encryption Schemes
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions of confidentiality and integrity. Although various AE schemes are known, there ...
Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff